BERT-Based Vulnerability Type Identification with Effective Program Representation

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:WASA (17. : 2022 : Dalian) Wireless algorithms, systems, and applications ; Part 1
1. Verfasser: Zhu, Chenguang (VerfasserIn)
Weitere Verfasser: Du, Gewangzi (VerfasserIn), Wu, Tongshuai (VerfasserIn), Cui, Ningning (VerfasserIn), Chen, Liwei (VerfasserIn), Shi, Gang (VerfasserIn)
Pages:1
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Energy Efficiency Optimization for RIS Assisted RSMA System over Estimated Channel 2022 Gao, Caina
A Practical Data Authentication Scheme for Unattended Wireless Sensor Networks Using Physically Unclonable Functions 2022 Wang, Pingchuan
Interference Mitigation via Collaborative Beamforming in UAV-Enabled Data Collections: A Multi-objective Optimization Method 2022 Li, Hongjuan
Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability 2022 Wang, Xiaolei
A Secure Aggregation Scheme for Model Update in Federated Learning 2022 Wang, Baolin
Efficient Post Quantum Random Oblivious Transfer Based on Lattice 2022 Xu, Lidong
Blockchain-Based Secure and Efficient Federated Learning with Three-phase Consensus and Unknown Device Selection 2022 Wang, Jianrong
FLFHNN: An Efficient and Flexible Vertical Federated Learning Framework for Heterogeneous Neural Network 2022 Sun, Han
Blockchain-Aided Hierarchical Attribute-Based Encryption for Data Sharing 2022 Ding, Jiaxu
An SM2-based Traceable Ring Signature Scheme for Smart Grid Privacy Protection 2022 Da Teng
An Effective Insider Threat Detection Apporoach Based on BPNN 2022 Tao, Xiaoling
The Link Awareness Driven Resource Allocation Algorithm Based on Scenario Marking and Vehicle Clustering in VANETs 2022 Zhang, Bixun
TimeBird: Context-Aware Graph Convolution Network for Traffic Incident Duration Prediction 2022 Sun, Fuyong
A Behavior Decision Method for Autonomous Vehicles in an Urban Scene 2022 Cheng, Jiujun
Optimal Deployment and Scheduling of a Mobile Charging Station in the Internet of Electric Vehicles 2022 Ma, Zhenxian
On Eliminating Blocking Interference of RFID Unauthorized Reader Detection 2022 Sun, Degang
Malicious Domain Detection with Heterogeneous Graph Propagation Network 2022 Hu, Cheng
Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption 2022 Qiu, Fengyuan
Secure RFID Handwriting Recognition-Attacker Can Hear but Cannot Understand 2022 Zhang, Qihang
Network Defense Resource Allocation Scheme with Multi-armed Bandits 2022 Huang, Ning
Alle Artikel auflisten